ELSA MEBRAHTU
Cyber security Analyst
Email: *****.*******@***********.*** Cell: 571-***-****
Professional Summary
Working as a Cyber Security Analyst for more than 5 years serving as an Information Technology (IT) specialist responsible for assisting in the operation and maintenance of the installations computer network and to provide technical assistance, training and support to customers.
Experienced in Software Development Life Cycle (SDLC) like Agile (SCRUM).
Discover evidence of malware, network penetrations and vulnerabilities within a client’s infrastructure and present the data to customers.
Analyzing vulnerability scans provided to us by our client to remove false positives using a (Nessus) tool before creating and delivering a final report.
Work closely with external security organization to constantly monitor security threats and defense.
Assisted with selection and implementation of controls that apply security protections to systems, processes and information resources using the NIST family of security controls.
Review and assess privacy controls in compliance with the privacy impact assessment (pia) and privacy threshold analysis (PTA) using NIST 800-53.
Provide computer network analytical support to a wide range of clients in commercial national security environments.
Discover networks anomalies and malicious traffic using advanced analytics.
Discover evidence of malware, network penetrations, and vulnerabilities within a client’s infrastructure and present the data to customers.
Technical Skill
Information Security: NIST.
Cyber Security: CompTIA, Cyber security, IDS, Cloud-Computing.
Network Security Tools: Nessus.
Professional Experience
Global Systems Engineering-VA
Sep 2020-Present
Cyber security Analyst
Responsibilities:
Work with developers, system/network administrators, and other associates to ensure secure design, development and implementation of applications and networks.
Assist the Cyber Security Manager with the development of the IA related Procedures, and Work Instructions.
Develop, improve and help implement best practices for risk reduction across a broad range of enterprise applications, systems, networks and interfaces.
Interviewing system administrators and other stakeholders to assist in generation custom reports and/or artifacts in support of the AA process.
Identifying security controls and constructs a compliance matrix for tracking.
Apply appropriate information security control for federal information system based on NIST 800-37; evaluate threats and vulnerabilities based on tenable reports.
Working directly with ISSO in the review of packages such as system security plan (SSP) to ensure the SSP is updated based upon findings in the requirement traceability matrix (RTM) and spearhead team of information security professionals responsible for the development of security policies, procedures, and security assessment and authorization (AA) packages for various commercial and government entities.
Providing security support to information system security officers (ISSO) and point of contact on the FISMA and NIST process.
Reviewing privacy threshold analysis (PTA) privacy impact assessment (PIA) and a system of record notice.
Ensuring customers adhere strictly to security policies and procedures following NIST 800-53 NIST 800-53a.
Reviewing artifacts and removed any PII (personally identifiable information) for audit requests. Perform vulnerability scanning and analysis with Nessus.
Directly manage and escalate outstanding remediation items to ensure timely completion.
LEIDOS-MD
Aug 2018- Aug 2020
Cyber security Analyst
Responsibilities:
Aid in development of system security plan (SSP), aa packages, national institute of standard and technology (NIST) documents, federal information processing standards (FIPS), security assessment report (SAR), risk management framework (RMF), along with other security documents on quarterly compliance basic.
Working knowledge of NIST SP 800-18, SP 800-30, SP 800-34, SP 800-37, SP 800-39, SP 800-53a, SP 800-53 rev 4, SP 800-53a, SP 800-60, SP 800-65, SP 800-118 and SP 800-137.
Put into a disaster recovery situation, whereby I had to assess the situation and organization vulnerabilities in order to ensure our SSPS was functioning the way we intended. If any of our plans failed worked with the ISSO to maintain and develop a plan of action and milestone (POAM) and remediation plan for failed systems.
Evaluate the security control assessment of the technical, management, and operational controls for the operating information systems. To guarantee the controls are implemented correctly and producing the desired outcome.
Ensure that all IT systems are operating, using, maintaining and disposing of in accordance with internal security policies and procedures.
Work with Nessus tool.
Responsible for developing, communicating, and maintaining a consolidated list of RMF activities and deliverable calendars.
Draft, finalize and submit privacy threshold assessments (PTA), privacy impact analyses, e-authentication assessments and system of record notice.
Develop and/or update the Plan of Action and Milestones (POA&M) to document all known vulnerabilities to corrector mitigate risks.
Familiarity with Governance and Risk and Compliance (GRC) frameworks tools such as Xacta.
SRS ManTech SRS Technologies, Inc- VA
June 2017-July 2018
Cyber security Analyst
Responsibilities:
Reviewing IDS/IPS events and identify anomalous activities or potential network security risks.
Analyzing network traffic and various log data to determine the threat/impact on the network.
Evaluating and performing incident escalation in accordance with incident response procedures.
Performing incident handling and documentation within the incident response lifecycle (detection, triage, analysis, mitigation, reporting and documentation).
Attending briefings in order to facilitate the sharing of information and increased awareness of cyber threats.
Guarantees that the company's software, devices, and data are sanitized, archived or decommissioned in compliance with the company's policy.
Ensures that OS, software, devices, and applications are thoroughly tested and configured according to technical security.
Utilizes a ticketing system (BMC remedy) to handle incident management.
Education:
Bachelor of Science in Information System Management Strayer University, Alexandria, Virginia
Citizenship: US Citizen, Public Trust
Certified: CompTIA Security+
References available upon request